‘Hosted by’ statement: This webinar series is graciously hosted by ActZero, a contributing member of the Blueprint for Ransomware Defense working group. Hosting this webinar does not constitute endorsing or promoting any participants’ solutions.
Now that you’ve inventoried your assets and built a strong foundation for protecting your devices, network, and people, it’s time to add the next layer of Safeguards. This 3rd session of our 5-part series focuses on the actionable Safeguards required to block a ransomware attack.
Watch Karen Evans (CRI), Brian Cute (GCA), Shehzad Mirza (CyberWA), and Josh Franklin (CIS) as they discuss the set of practices an enterprise must implement to manage devices and the people who use them effectively.
In the session, you’ll learn the following:
- Best practices for software management
- Practitioner advice on managing access controls and the tools to help out
- How identity protection plays such an essential role in ransomware defense, and why multifactor authentication is a game changer to your security
- Methods for optimizing vulnerability and patch management processes
The resources referenced in this webinar are: